메뉴 건너뛰기




Volumn 7, Issue 4, 2008, Pages 243-263

A multi-layer framework for puzzle-based denial-of-service defense

Author keywords

Client puzzles; Denial of service; Network protocols

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; COMPUTER AIDED ANALYSIS; COMPUTER CRIME; COMPUTER SYSTEMS; COSTS; ELECTRIC BREAKDOWN; FINANCE; INTERNET PROTOCOLS; LEGACY SYSTEMS; MANAGEMENT INFORMATION SYSTEMS; RESEARCH; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 47649085264     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0042-x     Document Type: Article
Times cited : (17)

References (64)
  • 6
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for internet services
    • Andersen, D.: Mayday: Distributed filtering for internet services. In: Proceeding of USITS (2003)
    • (2003) Proceeding of USITS
    • Andersen, D.1
  • 10
    • 47649122501 scopus 로고    scopus 로고
    • Internet Assigned Numbers Authority. ICMP type numbers. November
    • Internet Assigned Numbers Authority. ICMP type numbers. November, 2003. http://www.iana.org/assignments/icmp-parameters
    • (2003)
  • 12
    • 0038650772 scopus 로고    scopus 로고
    • Defending against sequence number attacks
    • In: May
    • Bellovin, S.: Defending against sequence number attacks. In: RFC 1948, May 1996
    • (1996) RFC 1948
    • Bellovin, S.1
  • 13
    • 8344278876 scopus 로고    scopus 로고
    • The ICMP traceback messages
    • In: December ftp://ftp.ietf.org/internet-drafts/draft-ietf-itrace-01.txt
    • Bellovin, S., Leech, M., Taylor, T.: The ICMP traceback messages. In: Internet-Draft, draft-ietf-itrace-01.txt, December 1999. ftp:// ftp.ietf.org/internet-drafts/draft-ietf-itrace-01.txt
    • (1999) Internet-Draft, Draft-ietf-itrace-01.txt
    • Bellovin, S.1    Leech, M.2    Taylor, T.3
  • 14
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom B.H. (1970). Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7): 422-426
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 17
    • 47649101240 scopus 로고    scopus 로고
    • Caida. Skitter
    • Caida. Skitter. 2003. http://www.caida.org/tools/measurement/
    • (2003)
  • 32
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • Geng X. and Whinston A. (2000). Defeating distributed denial of service attacks. IEEE IT Profes. 2(4): 36-41
    • (2000) IEEE IT Profes. , vol.2 , Issue.4 , pp. 36-41
    • Geng, X.1    Whinston, A.2
  • 37
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed traffic
    • Jin, C., Wang, A., Shin, K.G.: Hop-count filtering: an effective defense against spoofed traffic. In: Proceedings of ACM CCS (2003)
    • (2003) Proceedings of ACM CCS
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 38
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • In: Kent, S. (ed.)
    • Juels, A.A Brainard, J.: Client puzzle: a cryptographic defense against connection depletion attacks. In: Kent, S. (ed.) Proceedings of NDSS'99, pp. 151-165 (1999)
    • (1999) Proceedings of NDSS'99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 40
    • 3042859154 scopus 로고    scopus 로고
    • Resisting syn flood dos attacks with a syn cache
    • In: Leffler, S.J. (ed.) USENIX, February 11-14
    • Lemmon, J.: Resisting syn flood dos attacks with a syn cache. In: Leffler, S.J. (ed.) Proceedings of BSDCon 2002. USENIX, 2002, February 11-14
    • (2002) Proceedings of BSDCon 2002
    • Lemmon, J.1
  • 43
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • Meadows and C. (2001). A cost-based framework for analysis of denial of service networks. J. Comput. Secur. 9: 143-164
    • (2001) J. Comput. Secur. , vol.9 , pp. 143-164
    • Meadows, C.1
  • 44
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • Merkle R.C. (1978). Secure communications over insecure channels. Commun. ACM 21: 294-299
    • (1978) Commun. ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 47
    • 47649085814 scopus 로고    scopus 로고
    • Defensive programming: Using an annotation toolkit to build dos-resistant software
    • In: December
    • Qie, X., Pang, R., Peterson, L.: Defensive programming: Using an annotation toolkit to build dos-resistant software. In: Proceedings of the 5th OSDI Symposium, December 2002
    • (2002) Proceedings of the 5th OSDI Symposium
    • Qie, X.1    Pang, R.2    Peterson, L.3
  • 48
    • 0010602889 scopus 로고    scopus 로고
    • Time-lock puzzles and timed-release crypto
    • Manuscript, 10 March
    • Rivest, R.L., Shamir, A., Wagner, D.: Time-lock puzzles and timed-release crypto. Manuscript, 10 March 1996
    • (1996)
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.3
  • 53
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • In: April
    • Song, D., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings of IEEE INFOCOMM, April 2001
    • (2001) Proceedings of IEEE INFOCOMM
    • Song, D.1    Perrig, A.2
  • 54
    • 0002709112 scopus 로고    scopus 로고
    • Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
    • Stoica, I., Shenker, S., Zhang, H.: Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks. In: Proceedings of ACM SIGCOMM (1998)
    • (1998) Proceedings of ACM SIGCOMM
    • Stoica, I.1    Shenker, S.2    Zhang, H.3
  • 57
    • 14844296912 scopus 로고
    • June ftp://ftp.internic.net/rfc/rfc1810.txt, ftp://ftp.math.utah.edu/ pub/rfc/rfc1810.txt
    • Touch, J.: RFC 1810: Report on MD5 performance, June 1995. ftp:// ftp.internic.net/rfc/rfc1810.txt, ftp://ftp.math.utah.edu/pub/rfc/ rfc1810.txt
    • (1995) RFC 1810: Report on MD5 Performance
    • Touch, J.1
  • 59
    • 84954449334 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • In: May
    • Wang, X.F., Reiter, M.: Defending against denial-of-service attacks with puzzle auctions. In: IEEE Symposium on Security and Privacy, May 2003
    • (2003) IEEE Symposium on Security and Privacy
    • Wang, X.F.1    Reiter, M.2
  • 62
    • 84954422497 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • In: May
    • Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: IEEE Symposium on Security and Privacy, May 2003. http://www.ece.cmu.edu/~adrian/projects/pi.ps
    • (2003) IEEE Symposium on Security and Privacy
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.